Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

EPF - Evil Packet Filter

USENIX via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a cutting-edge security presentation from USENIX ATC '23 that delves into a novel method for bypassing kernel isolation techniques in Linux. Learn about EPF (Evil Packet Filter), which exploits the BPF infrastructure to mount privilege escalation attacks on both 32- and 64-bit x86 platforms. Discover two EPF instances, BPF-Reuse and BPF-ROP, and understand their implications for kernel security. Gain insights into the researchers' proposed defenses that enforce isolation between BPF instructions and benign kernel data, as well as maintain BPF program execution integrity. Understand how these protective measures effectively counter EPF-based attacks while incurring minimal overhead. This 20-minute talk by researchers from Brown University offers valuable knowledge for cybersecurity professionals, system administrators, and anyone interested in advanced OS kernel security strategies.

Syllabus

USENIX ATC '23 - EPF: Evil Packet Filter

Taught by

USENIX

Reviews

Start your review of EPF - Evil Packet Filter

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.